Russian hackers attack Windows machines through Linux virtual machines with new custom malware



  • Curly COMrades Deployed Alpine Linux Virtual Machines on Windows Hosts to Hide Reverse Shell Malware Activity
  • VM traffic channeled through the host IP, avoiding traditional EDR and masking outbound communications.
  • Targets included Georgian and Moldovan institutions; The operations align with Russian geopolitical interests.

Russian hackers known as Curly COMrades have been seen hiding their malware in Linux-based virtual machines (VMs) deployed on Windows devices, experts have warned.

Bitdefender security researchers, after analyzing the latest activities together with the Georgia Computer Emergency Response Team (CERT), discovered that Curly COMrades began attacking its victims in July 2025, when they executed remote commands to enable the microsoft-hyper-v virtualization feature and disable its management interface.



Leave a Comment

Your email address will not be published. Required fields are marked *